The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
This paper exploits recent developments in sparse approximation and compressive sensing to efficiently perform localization in a sensor network. We introduce a Bayesian framework...
Volkan Cevher, Petros Boufounos, Richard G. Barani...
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
This paper describes a validation approach of a socio-technical design support system using data mining techniques. Bayesian Belief Networks (BBN) are used to assess human error an...
Andreas Gregoriades, Alistair G. Sutcliffe, Harala...
Two Bayesian-network structures are said to be equivalent if the set of distributions that can be represented with one of those structures is identical to the set of distributions...